Cryptology ePrint Archive: Report 2011/556

Available versions in chronological order


GF(2^n) redundant representation using matrix embedding
Yongjia Wang and Haining Fan
Publication Info: not published

GF(2^n) redundant representation using matrix embedding
Yongjia Wang and Xi Xiong and Haining Fan


[ Cryptology ePrint archive ]